read.ehrlich.dev
ai-curated rss
about
github
rss
dark
thehackernews.com
posts from thehackernews.com
hot
new
week
month
year
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth
615
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
(thehackernews.com)
24 days ago ·
containers
·
devops
265
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure
(thehackernews.com)
24 days ago ·
security
·
reverse engineering
72
Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
(thehackernews.com)
23 days ago ·
security
·
git internals
74
Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
(thehackernews.com)
23 days ago ·
containers
·
devops
155
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
(thehackernews.com)
24 days ago ·
security
·
open source
280
54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
(thehackernews.com)
25 days ago ·
malware analysis
·
reverse engineering
32
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
(thehackernews.com)
23 days ago ·
security
·
git internals
135
ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
(thehackernews.com)
25 days ago ·
security
·
cloud infrastructure
42
Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks
(thehackernews.com)
24 days ago ·
reverse engineering
·
swift
38
DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
(thehackernews.com)
24 days ago ·
observability
·
cloud infrastructure
25
Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
(thehackernews.com)
24 days ago ·
open source
·
api design
22
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
(thehackernews.com)
24 days ago ·
ai
·
malware analysis
28
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
(thehackernews.com)
25 days ago ·
malware analysis
·
security
190
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
(thehackernews.com)
1 month ago ·
containers
·
nix
105
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
(thehackernews.com)
1 month ago ·
information theory
·
statistics
310
Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation
(thehackernews.com)
1 month ago ·
security
80
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
(thehackernews.com)
1 month ago ·
malware analysis
95
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
(thehackernews.com)
1 month ago ·
security
·
malware analysis
65
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8
(thehackernews.com)
1 month ago ·
site reliability
·
webdev
38
Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
(thehackernews.com)
1 month ago ·
digital rights
·
cryptography
68
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
(thehackernews.com)
1 month ago ·
site reliability
·
git internals
48
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
(thehackernews.com)
1 month ago ·
digital rights
·
malware analysis
22
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
(thehackernews.com)
1 month ago ·
digital rights
·
malware analysis
70
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
(thehackernews.com)
1 month ago ·
malware analysis
20
Investigating a New Click-Fix Variant
(thehackernews.com)
1 month ago ·
information theory
·
writing
42
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
(thehackernews.com)
1 month ago ·
malware analysis
42
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
(thehackernews.com)
1 month ago ·
malware analysis
42
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
(thehackernews.com)
1 month ago ·
security
·
site reliability
28
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
(thehackernews.com)
1 month ago ·
cloud infrastructure
42
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
(thehackernews.com)
1 month ago ·
security
·
site reliability
42
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
(thehackernews.com)
1 month ago ·
malware analysis
42
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
(thehackernews.com)
1 month ago ·
malware analysis
42
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
(thehackernews.com)
1 month ago ·
digital rights
·
cryptography
42
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
(thehackernews.com)
1 month ago ·
digital rights
·
open source
85
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
(thehackernews.com)
1 month ago ·
reverse engineering
·
swift
6
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
(thehackernews.com)
1 month ago ·
algorithmic trading
·
site reliability
18
Where Multi-Factor Authentication Stops and Credential Abuse Starts
(thehackernews.com)
1 month ago ·
security
12
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
(thehackernews.com)
1 month ago ·
cryptography
·
quantum computing
8
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
(thehackernews.com)
1 month ago ·
digital rights
·
malware analysis
12
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
(thehackernews.com)
1 month ago ·
malware analysis
·
observability
1
OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills
(thehackernews.com)
2 months ago ·
malware analysis
1
German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
(thehackernews.com)
2 months ago ·
security
·
digital rights
1
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
(thehackernews.com)
2 months ago ·
malware analysis
1
CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
(thehackernews.com)
2 months ago ·
cloud infrastructure
·
api design
1
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
(thehackernews.com)
2 months ago ·
digital rights
1
How Samsung Knox Helps Stop Your Network Security Breach
(thehackernews.com)
2 months ago ·
homelab
1
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
(thehackernews.com)
2 months ago ·
reverse engineering
·
open source
1
Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
(thehackernews.com)
2 months ago ·
malware analysis
·
exploit development
1
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
(thehackernews.com)
2 months ago ·
cloud infrastructure
·
observability
1
ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
(thehackernews.com)
2 months ago ·
cloud infrastructure
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth